Security

Windows only: Microsoft has just released the public version of their free virus, spyware, and malware protection suite dubbed Microsoft Security Essentials (the successor to their lesser-known Live OneCare product which offered similar features). Security Essentials is a quick download and simple installation, giving users clear and easy-to-use indications whether your PC is secure or not.
In...

URL shorteners are everywhere, and have exploded in popularity with sites like Twitter that have a character limit per message. While URL shortening services provide a great way to share links quickly with friends – there is also a significant security risk of being sent to a malicious website. For example, check out this great link: http://is.gd/2dPpA.
This risk can be mitigated by using a ...

This article will guide you through the steps required to connect a computer running OS X 10.5 to a Windows domain, allowing you to login using your Active Directory credentials. Since Active Directory is so widely used, it is useful to be able to set up any computers running OS X to authenticate through it.
Step 1: Open the Directory Utility tool, which can be found under Applications -> Utilitie...

Data security is more important than ever in modern times, so to help keep your files safe, Windows Vista (Enterprise and Ultimate editions), Windows 7, and Windows Server 2008 include an encryption program called BitLocker.
BitLocker is essentially a software encryption program that encrypts a drive in such a way that if credentials are not verified, it renders the drive completely useless to thi...

With literally dozens of copies of the Windows 7 ISO floating around the internet (and countless more once the RTM is inevitably leaked) – it has become increasingly important to verify your copy is legitimate before installation. Verifying your ISO not only lets you know that you have the correct file, it also protects you from viruses or trojans that could be hidden in a illegitimate copy.
T...

It’s likely that at some point in time, you will either sell your computer or install a new operating system on your current machine. In either situation, it’s recommended that you wipe your hard drive clean of any and all information.
Most people will tell you to format your computer because it deletes everything from the hard drive, but while formatting does in fact remove information and...

uTorrent – a popular BitTorrent client for Windows – has a little-known IP blocking feature which can help protect you from unwanted observation by anti-P2P organizations or government institutions. The easiest way to block unwanted IPs is to download and install PeerGuardian 2, but this software only works well in Windows XP so Windows Vista and Windows 7 users should follow this guide ins...

Today is April 1st, and with that comes the fear of your computer being infected with the Conficker worm. Besides following Lifehacker’s tips to protect your PC from Conficker, you can follow a more advanced method of scanning your computer in this guide.
UPDATE: There are new and easier methods to scan your computer for the Conficker worm:
Online Conficker Detector (developed by authors of t...